{"id":25999,"date":"2025-09-29T13:24:51","date_gmt":"2025-09-29T21:24:51","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/09\/29\/news-19718\/"},"modified":"2025-09-29T13:24:51","modified_gmt":"2025-09-29T21:24:51","slug":"news-19718","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/09\/29\/news-19718\/","title":{"rendered":"Retail at risk:\u00a0How one alert uncovered a persistent cyberthreat\u200b\u200b"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Incident Response| Date: Wed, 24 Sep 2025 17:00:00 +0000<\/strong><\/p>\n<p class=\"wp-block-paragraph\">In the latest edition of our Cyberattack Series, we dive into real-world cases targeting retail organizations. With 60% of retail companies reporting operational disruptions from cyberattacks and 43% experiencing security compromises in the past year, the risks for businesses continue to increase.<sup>1<\/sup> This post unpacks where a single alert led to the discovery of a major persistent cyberthreat, how cyberattackers exploited unpatched SharePoint vulnerabilities and compromised identities to infiltrate networks\u2014and how Microsoft Incident Response\u2013the Detection and Response Team (DART) swiftly stepped in with forensic insights and actionable guidance. <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2336417\" target=\"_blank\" rel=\"noreferrer noopener\">Download the full report<\/a> to learn more about how one small signal exposed a much larger danger, and how you can strengthen your defenses against similar cyberthreats.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2336417\" target=\"_blank\" rel=\"noreferrer noopener\">Download the full Cyberattack report<\/a><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"what-happened\">What happened?<\/h2>\n<p class=\"wp-block-paragraph\">The cases we\u2019re examining in detail spanned two parts\u2014Reactive 1 and Reactive 2. Reactive 1 began when a retail customer received a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender<\/a> Experts alert titled \u201cPossible web shell installation.\u201d The Investigation revealed a malicious ASPX file on their SharePoint server, linked to vulnerabilities CVE-2025-49706 and CVE-2025-49704. These allowed cyberattackers to spoof identities and inject remote code.<\/p>\n<p class=\"wp-block-paragraph\">Reactive 2 started with a single compromised identity. Cyberattackers gained persistence by abusing self-service password reset features and mapped the organization\u2019s identity structure using Microsoft Entra ID and Microsoft Graph API. The issue escalated access using Azure Virtual Desktop and Remote Desktop Protocol (RDP), deployed tools like PsExec and SQL Server Management Studio, and maintained control using Teleport, Azure CLI, and Rsocx proxy. Credential manipulation and directory exploration followed, confirmed by Entra ID risk events. The Detection and Response Team (DART) again provided expert support to contain and analyze the threat.<\/p>\n<p class=\"wp-block-paragraph\">In both cases, the customer engaged DART quickly, which helped validate the scope of the compromise and assess cyberattacker activity and persistence mechanisms.<\/p>\n<figure class=\"wp-block-pullquote has-quote-default-font-size\">\n<blockquote>\n<p><strong>Insight: Identity management weakness<\/strong><br \/>Lack of account separation between standard users and privileged users significantly increased the risk of lateral movement. Nine out of 20 accounts had elevated access without proper tiering.<\/p>\n<\/blockquote>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"how-did-microsoft-respond\">How did Microsoft respond?<\/h2>\n<p class=\"wp-block-paragraph\">DART swiftly addressed the two security incidents by executing a comprehensive set of actions aimed at restoring control, containing cyberthreats, and reinforcing long-term resilience. The team began by reclaiming identity systems\u2014both on-premises and cloud\u2014through Active Directory takeback and Entra ID isolation. It neutralized threat actor access by deprivileging compromised accounts, revoking tokens, and identifying persistence mechanisms like Teleport and multifactor authentication (MFA) device registration. Malicious web shells were detected and removed within hours, showcasing rapid containment capabilities.<\/p>\n<p class=\"wp-block-paragraph\">To investigate and remediate the incidents, Microsoft deployed proprietary forensic tools across critical infrastructure, enabling root cause analysis and operational recovery. The team also guided the affected organization through security configuration enhancements aligned with <a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview\">Zero Trust principles<\/a>, including MFA enforcement. Threat intelligence from Defender and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> confirmed systemic identity compromise, prompting patching of vulnerable systems and a phased mass password reset with user identity re-attestation. Additionally, reverse engineering of ransomware revealed targeted attacks on ESXi directories, informing further mitigation strategies.<\/p>\n<figure class=\"wp-block-pullquote has-quote-default-font-size\">\n<blockquote>\n<p><strong>New cyberattacker behavior<\/strong><br \/>The cyberattacker used custom obfuscated web shells that bypassed basic detection, reinforcing the importance of behavioral analytics to detect rapidly evolving tactics.<\/p>\n<\/blockquote>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"what-can-customers-do-to-prepare\">What can customers do to prepare?<\/h2>\n<p class=\"wp-block-paragraph\">In the case of Reactive 1, we recommended critical security actions to fortify on-premises SharePoint environments and minimize exposure to known vulnerabilities, something we recommend for all customers. Customers can reduce their risk by deploying endpoint detection and response (EDR) across all devices, conducting regular vulnerability scans, and strengthening identity and access controls. Centralized logging and threat intelligence should also be implemented, along with preserving evidence and maintaining a robust incident response plan. Tools to monitor behavioral anomalies, suspicious processes, and malware indicators are increasingly necessary to protect against today\u2019s threat actors.<\/p>\n<p class=\"wp-block-paragraph\">Patching promptly\u2014especially for known exploited vulnerabilities\u2014remains a key defense for customers. Regular security hygiene practices\u2014like enforcing MFA across all accounts, removing inactive credentials, and applying least privileged access principles\u2014can improve defenses in real time as threats change fast.<\/p>\n<figure class=\"wp-block-pullquote has-quote-default-font-size\">\n<blockquote>\n<p><strong>The increasing speed of cyberattacks<\/strong><br \/>The speed of the attacker was notable. We observed \u201chands-on keyboard\u201d behavior within moments of compromise, highlighting the importance of real-time detection and response.<\/p>\n<\/blockquote>\n<\/figure>\n<div class=\"is-style-inline wp-block-bloginabox-theme-promotional\">\n<div class=\"promotional promotional--has-media promotional--media-right\">\n<div class=\"promotional__wrapper\">\n<div class=\"promotional__content-wrapper\">\n<div class=\"promotional__content\">\n<h2 class=\"wp-block-heading\" id=\"secure-your-spot\">Secure your spot<\/h2>\n<p class=\"wp-block-paragraph\">Ready to strengthen your security strategy for the AI era? Register now for&nbsp;<a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" href=\"https:\/\/register.secure.microsoft.com\/?ocid=cmme8nzzcuz\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Secure<\/a>, on September 30, to explore the latest AI-first solutions. Then, join us at&nbsp;<a href=\"https:\/\/ignite.microsoft.com\/en-US\/home?wt.mc_ID=Ignite2025_marx_corp_bl_oo_bl_Security_2_1\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Ignite<\/a>\u2014November 17\u201321 in San Francisco, CA or online\u2014to deep dive into more innovations, connect with industry experts, experience hands-on labs, and earn certifications.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"promotional__media-wrapper\">\n<div class=\"promotional__media\"> \t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"718\" height=\"708\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/09\/Security_Blog_Events_06-e1758559429360.png\" class=\"attachment-full size-full\" alt=\"Microsoft Security banners at event\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"what-is-the-cyberattack-series\">What is the Cyberattack Series?<\/h2>\n<p class=\"wp-block-paragraph\">With our Cyberattack Series, customers discover how DART investigates unique and notable cyberattacks. For each cyberattack story, we share:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">How the cyberattack happened<\/li>\n<li class=\"wp-block-list-item\">How the security compromise was discovered<\/li>\n<li class=\"wp-block-list-item\">Microsoft\u2019s investigation and eviction of the threat actor<\/li>\n<li class=\"wp-block-list-item\">Strategies to avoid similar cyberattacks<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">While retail customers were the target of cyberattackers this time, these incidents serve as a stark reminder that proactive patching, identity segmentation, and continuous monitoring are essential security practices to defend against modern cyber threats for all customers.\u202f<a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\" target=\"_blank\" rel=\"noreferrer noopener\">DART<\/a> is made up of highly skilled investigators, researchers, engineers, and analysts who specialize in handling global security incidents. We\u2019re here for customers with dedicated experts to work with you before, during, and after a cybersecurity incident.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more-with-microsoft-security\">Learn more with Microsoft Security<\/h2>\n<p class=\"wp-block-paragraph\">To learn more about DART capabilities, please <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>, or reach out to your Microsoft account manager or premier support contact. To learn more about the cybersecurity incidents described above, including more insights and information on how to protect your own organization, <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2336417\" target=\"_blank\" rel=\"noreferrer noopener\">download the full report<\/a>.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#https:\/\/go.microsoft.com\/fwlink\/?linkid=2336417\" target=\"_blank\" rel=\"noreferrer noopener\">Download the full Cyberattack report<\/a><\/div>\n<\/p><\/div>\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website<\/a>. Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and&nbsp;X&nbsp;(<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>) for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/gitnux.org\/retail-cybersecurity-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Retail Cybersecurity Statistics: Market Data Report 2025<\/a>&nbsp;<\/p>\n<p class=\"wp-block-paragraph\">\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/09\/24\/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat\/\">Retail at risk:\u00a0How one alert uncovered a persistent cyberthreat\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/09\/24\/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Incident Response| Date: Wed, 24 Sep 2025 17:00:00 +0000<\/strong><\/p>\n<p>In the latest edition of our Cyberattack Series, we dive into real-world cases targeting retail organizations. With 60% of retail companies reporting operational disruptions from cyberattacks and 43% experiencing breaches in the past year, the stakes have never been higher. This post unpacks where a single alert led to the discovery of a major persistent threat, how attackers exploited unpatched SharePoint vulnerabilities and compromised identities to infiltrate networks\u2014and how the Microsoft Incident Response\u2014the Detection and Response Team (DART) swiftly stepped in with forensic insights and actionable guidance. Download the full report to learn more about how one small signal exposed a much larger danger, and how you can strengthen your defenses against similar threats.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/09\/24\/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat\/\">Retail at risk:\u00a0How one alert uncovered a persistent cyberthreat\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25999","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25999"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25999\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}